101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

516
active users

#cve

4 posts4 participants0 posts today
gcve.eu<p>GCVE-BCP-03 - Decentralized Publication Standard has been published and open for public review. </p><p>The next release of <span class="h-card" translate="no"><a href="https://social.circl.lu/@vulnerability_lookup" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>vulnerability_lookup</span></a></span> will support it. </p><p><a href="https://social.circl.lu/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://social.circl.lu/tags/gcve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gcve</span></a> <a href="https://social.circl.lu/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://social.circl.lu/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://social.circl.lu/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> </p><p>🔗 <a href="https://gcve.eu/bcp/gcve-bcp-03/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">gcve.eu/bcp/gcve-bcp-03/</span><span class="invisible"></span></a></p>
Bill<p>Huh. Rare research suppression by Apple.</p><p><a href="https://seclists.org/fulldisclosure/2025/Jun/14" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">seclists.org/fulldisclosure/20</span><span class="invisible">25/Jun/14</span></a></p><p><a href="https://infosec.exchange/tags/apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apple</span></a> <a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a></p>
HeadlessZeke<p>Details for 15 vulns of mine just got posted to the <span class="h-card" translate="no"><a href="https://infosec.exchange/@AustinHackers" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>AustinHackers</span></a></span> disclosures page! Thanks to <span class="h-card" translate="no"><a href="https://infosec.exchange/@todb" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>todb</span></a></span> for all the help with the writeups and disclosure process.</p><p><a href="https://takeonme.org/cve/#2025-disclosures" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">takeonme.org/cve/#2025-disclos</span><span class="invisible">ures</span></a></p><p><a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a></p>
Alexandre Dulaunoy<p>The hackathon FIRSTCON25 takes place physically at 37th ANNUAL FIRST CONFERENCE on Sunday 22nd June in Copenhagen.</p><p>GCVE.eu topic has been added to the hackathon.</p><p>🔗 About the hackathon <a href="https://discourse.ossbase.org/c/hackathon-firstcon25/12" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discourse.ossbase.org/c/hackat</span><span class="invisible">hon-firstcon25/12</span></a><br>🔗 GCVE.eu topic <a href="https://discourse.ossbase.org/t/gcve-eu-processes-standards-bcp-and-tooling/95" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discourse.ossbase.org/t/gcve-e</span><span class="invisible">u-processes-standards-bcp-and-tooling/95</span></a><br>🔗 Registration <a href="https://pretix.eu/circl/hackathonfirst25/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pretix.eu/circl/hackathonfirst</span><span class="invisible">25/</span></a></p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@firstdotorg" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>firstdotorg</span></a></span> <span class="h-card" translate="no"><a href="https://social.circl.lu/@gcve" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>gcve</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@ddu" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ddu</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@jtk" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jtk</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@gallypette" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>gallypette</span></a></span> </p><p><a href="https://infosec.exchange/tags/gcve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gcve</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/hackathon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackathon</span></a> <a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://infosec.exchange/tags/firstcon25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firstcon25</span></a></p>
openSUSE Linux<p>May’s <a href="https://fosstodon.org/tags/Tumbleweed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tumbleweed</span></a> update rolled out <a href="https://fosstodon.org/tags/QEMU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QEMU</span></a> 10.0 for improved virtualization 🖥️⚡ and <a href="https://fosstodon.org/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a> 3.5.0 with post-<a href="https://fosstodon.org/tags/quantum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantum</span></a> <a href="https://fosstodon.org/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> 💡Security got serious with <a href="https://fosstodon.org/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> fixes 🛡️ <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a> <a href="https://news.opensuse.org/2025/06/02/tw-monthly-update-may/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.opensuse.org/2025/06/02/t</span><span class="invisible">w-monthly-update-may/</span></a></p>
CERT@VDE<p><a href="https://infosec.exchange/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a> <a href="https://infosec.exchange/tags/Advisory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Advisory</span></a> VDE-2025-020<br>WAGO: Switches affected by year 2k38 problem</p><p><a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> CVE-2025-1235</p><p><a href="https://certvde.com/en/advisories/VDE-2025-020" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">certvde.com/en/advisories/VDE-</span><span class="invisible">2025-020</span></a></p><p><a href="https://infosec.exchange/tags/CSAF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSAF</span></a> <a href="https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-020.json" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wago.csaf-tp.certvde.com/.well</span><span class="invisible">-known/csaf/white/2025/vde-2025-020.json</span></a></p>
sekurak News<p>Masz router Asusa? Sprawdź czy nie została wydana aktualizacja</p><p>Firma GreyNoise (wykorzystując AI) natrafiła na aktywną kampanię nieznanej grupy cyberprzestępców, która wykorzystuje kilka podatności do przejęcia kontroli nad routerami firmy Asus. Kampania śledzona jest pod nazwą ViciousTrap.&nbsp; Wśród wykorzystywanych luk możemy znaleźć, załataną niedawno podatność CVE-2023-39780 czyli command injection, która pozwala na wykonywanie poleceń systemowych. Oprócz tego, w atakach,...</p><p><a href="https://mastodon.com.pl/tags/WBiegu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WBiegu</span></a> <a href="https://mastodon.com.pl/tags/Apt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apt</span></a> <a href="https://mastodon.com.pl/tags/Asus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Asus</span></a> <a href="https://mastodon.com.pl/tags/Ataki" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ataki</span></a> <a href="https://mastodon.com.pl/tags/Cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cve</span></a> <a href="https://mastodon.com.pl/tags/Iot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Iot</span></a> <a href="https://mastodon.com.pl/tags/Router" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Router</span></a></p><p><a href="https://sekurak.pl/masz-router-asusa-sprawdz-czy-nie-zostala-wydana-aktualizacja/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sekurak.pl/masz-router-asusa-s</span><span class="invisible">prawdz-czy-nie-zostala-wydana-aktualizacja/</span></a></p>
CVE Program<p>All of the videos from “CVE/FIRST VulnCon 2025” are now available on YouTube! <br> <br><a href="https://www.youtube.com/playlist?list=PLWfD9RQVdJ6cm3kSvz-Sk87CawSzn5Ep0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/playlist?list=PLWf</span><span class="invisible">D9RQVdJ6cm3kSvz-Sk87CawSzn5Ep0</span></a> <br> <br><a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://mastodon.social/tags/FIRST" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FIRST</span></a> <a href="https://mastodon.social/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityManagement</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a></p>
Alexandre Dulaunoy<p>The VLAI Severity model is accessible via API. Here is a simple example from a recent Ivanti vulnerability description from their vulnerability webpage.</p><p>The VLAI Security model for vulnerabilities is accessible via vulnerability-lookup and the public instance operated by CIRCL. </p><p>So, if you have a vulnerability description, you can quickly assess it to get a general idea of its severity.</p><pre><code>curl -X 'POST' \<br> 'https://vulnerability.circl.lu/api/vlai/severity-classification' \<br> -H 'accept: application/json' \<br> -H 'Content-Type: application/json' \<br> -d '{ "description": "Ivanti has released updates for Ivanti Neurons for ITSM (on-prem only) which addresses one critical severity vulnerability. Depending on system configuration, successful exploitation could allow an unauthenticated remote attacker to gain administrative access to the system. We are not aware of any customers being exploited by these vulnerabilities at the time of disclosure. We have included an environmental score to provide customers with additional context on the adjusted risk of this vulnerability with typical use cases. Customers who have followed Ivanti guidance on securing the IIS website and restricted access to a limited number of IP addresses and domain names have a reduced risk to their environment. Customers who have users log into the solution from outside their company network also have a reduced risk to their environment if they ensure that the solution is configured with a DMZ." }'<br></code></pre><p>and the result</p><pre><code>{<br> "severity": "Critical",<br> "confidence": 0.9256<br>}<br></code></pre><p><a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://infosec.exchange/tags/ivanti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ivanti</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> </p><p>For more details: <a href="https://www.vulnerability-lookup.org/2025/05/22/vulnerability-lookup-2-10-0/#ai-powered-enrichment-using-our-in-house-ai-models" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">vulnerability-lookup.org/2025/</span><span class="invisible">05/22/vulnerability-lookup-2-10-0/#ai-powered-enrichment-using-our-in-house-ai-models</span></a></p><p><span class="h-card" translate="no"><a href="https://social.circl.lu/@circl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>circl</span></a></span> <span class="h-card" translate="no"><a href="https://social.circl.lu/@gcve" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>gcve</span></a></span></p>
gcve.eu<p>Significant progress has been made on the BCP-3 document, as well as on the implementation to enable synchronization and distributed publication of vulnerabilities.</p><p>The 2.10.0 release of vulnerability-lookup.org already includes the GCVE directory, and the next version will support BCP-3 as the reference implementation.</p><p>Thanks to <span class="h-card" translate="no"><a href="https://social.circl.lu/@circl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>circl</span></a></span> <span class="h-card" translate="no"><a href="https://fosstodon.org/@cedric" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cedric</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@adulau" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>adulau</span></a></span> <span class="h-card" translate="no"><a href="https://misp-community.org/@misp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>misp</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@iglocska" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>iglocska</span></a></span> and many GNA for the contributions and constructive feedback.</p><p><a href="https://social.circl.lu/tags/gcve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gcve</span></a> <a href="https://social.circl.lu/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://social.circl.lu/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://social.circl.lu/tags/gna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gna</span></a> <a href="https://social.circl.lu/tags/cna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cna</span></a></p>
CERT@VDE<p><a href="https://infosec.exchange/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a> <a href="https://infosec.exchange/tags/Advisory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Advisory</span></a> VDE-2025-044<br>Weidmueller: Industrial ethernet switches are affected by multiple vulnerabilities</p><p><a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> CVE-2025-41651, CVE-2025-41652, CVE-2025-41649, CVE-2025-41650, CVE-2025-41653</p><p><a href="https://certvde.com/en/advisories/VDE-2025-044" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">certvde.com/en/advisories/VDE-</span><span class="invisible">2025-044</span></a></p><p><a href="https://infosec.exchange/tags/CSAF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSAF</span></a> <a href="https://weidmueller.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-044.json" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">weidmueller.csaf-tp.certvde.co</span><span class="invisible">m/.well-known/csaf/white/2025/vde-2025-044.json</span></a></p>
Alexandre Dulaunoy<p>CVE-2024-4367 (PDF.js) is gaining traction in some exploitation-focused Telegram channels...</p><p><a href="https://vulnerability.circl.lu/cve/CVE-2024-4367" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vulnerability.circl.lu/cve/CVE</span><span class="invisible">-2024-4367</span></a></p><p>seen via <span class="h-card" translate="no"><a href="https://infosec.exchange/@ail_project" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ail_project</span></a></span> </p><p><a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a></p>
Bálint Magyar<p>Just posted my new article on another client-side remote code execution bug I found in Google Web Designer back in February, tracked as CVE-2025-4613, fixed in an April release. Enjoy the write-up!</p><p><a href="https://bm.gy/gwdrce2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bm.gy/gwdrce2</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/IndieSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IndieSec</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a></p>
Elias Mårtenson<p>How is Github doing CVSS scoring? I was looking at <a href="https://euvd.enisa.europa.eu/vulnerability/CVE-2022-41966" rel="nofollow noopener" target="_blank">CVE-2022-41966</a> and it has a CVSS vector that indicates Integrity: Low.</p><p>The vulnerability allows an attacker who can feed malicious data to an XML deserialiser to crash the parser with a StackOverflowError. The fix changes this to a different type of exception. How can that in any way be marked as having an integrity impact at all?</p><p>I note that the NIST assessment has the much more appropriate assessment here where there is no impact of integrity.</p><p><a href="https://functional.cafe/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://functional.cafe/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a></p>
sekurak News<p>Aktualizujcie przeglądarki Firefox i Chrome</p><p>W ostatnich dniach pojawiły się aktualizacje krytycznych błędów w przeglądarkach Google Chrome oraz Firefox. TLDR: W przypadku tej pierwszej mamy do czynienia z aktualizacją&nbsp;do wersji 136.0.7103.113/.114 dla systemów Windows oraz macOS i 136.0.7103.113 dla systemów Linux. Zgodnie z ogłoszeniem, poprawione zostały cztery błędy, z czego dwa miały poziom istotności wysoki....</p><p><a href="https://mastodon.com.pl/tags/WBiegu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WBiegu</span></a> <a href="https://mastodon.com.pl/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> <a href="https://mastodon.com.pl/tags/Cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cve</span></a> <a href="https://mastodon.com.pl/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a></p><p><a href="https://sekurak.pl/aktualizujcie-przegladarki-firefox-i-chrome/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sekurak.pl/aktualizujcie-przeg</span><span class="invisible">ladarki-firefox-i-chrome/</span></a></p>
CERT@VDE<p><a href="https://infosec.exchange/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a> <a href="https://infosec.exchange/tags/Advisory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Advisory</span></a> VDE-2025-041<br>Weidmueller: ResMa is affected by a Vulnerability for ASP.NET AJAX</p><p>Weidmueller product ResMa is affected by ASP.NET AJAX vulnerability.<br>Weidmueller has released a new firmware for the affected product to fix the vulnerability.<br><a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> CVE-2025-3600</p><p><a href="https://certvde.com/en/advisories/VDE-2025-041" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">certvde.com/en/advisories/VDE-</span><span class="invisible">2025-041</span></a></p><p><a href="https://infosec.exchange/tags/CSAF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSAF</span></a> <a href="https://weidmueller.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-041.json" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">weidmueller.csaf-tp.certvde.co</span><span class="invisible">m/.well-known/csaf/white/2025/vde-2025-041.json</span></a></p>
gcve.eu<p><span class="h-card" translate="no"><a href="https://social.circl.lu/@cedric" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cedric</span></a></span> Thanks for the continuous work on the Python GCVE client for the registry. </p><p>The client is available at the following location: </p><p>🐍 <a href="https://github.com/gcve-eu/gcve" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/gcve-eu/gcve</span><span class="invisible"></span></a></p><p><a href="https://social.circl.lu/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://social.circl.lu/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://social.circl.lu/tags/gcve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gcve</span></a> <a href="https://social.circl.lu/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://social.circl.lu/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
cryptax<p>Quote of the day (HD Moore keynote at <span class="h-card" translate="no"><a href="https://infosec.exchange/@NorthSec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>NorthSec</span></a></span> ) : "no need to run faster than the bear, just run faster than your friend" :-o</p><p><a href="https://mastodon.social/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a></p>
Cedric<p>The Global CVE (GCVE) allocation system is decentralized approach to vulnerability identification and numbering. The GCVE registry is a key component.</p><p>For this reason the registry is digitally signed using an RSA public key with SHA-512.</p><p>Thanks to the GCVE Python client, updating your local copy of the registry and verifying its integrity is just one command away:</p><p> $ gcve registry --pull</p><p>Learn more: <a href="https://gcve.eu" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">gcve.eu</span><span class="invisible"></span></a></p><p><a href="https://social.circl.lu/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.circl.lu/tags/CVD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVD</span></a> <a href="https://social.circl.lu/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://social.circl.lu/tags/GCVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GCVE</span></a> <a href="https://social.circl.lu/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://social.circl.lu/tags/VulnerabilityLookup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityLookup</span></a></p>
Richi Jennings<p>EU Vulnerability Database (<a href="https://vmst.io/tags/EUVD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EUVD</span></a>) launches this week. And not a moment too soon.</p><p>The EU Agency for Cybersecurity (<a href="https://vmst.io/tags/ENISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ENISA</span></a>) has brought EUVD out of beta. Born from a 2022 EU law, EUVD will work alongside MITRE’s Common Vulnerabilities and Exposures database (<a href="https://vmst.io/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>)—the future of which is still hazy after last month’s last-minute funding reprieve.</p><p>ENISA executive director Juhan Lepassaar (pictured) is keen to get on with the job. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SBBlogwatch</span></a>, we take this kiss throughout the world.</p><p>@TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/05/euvd-launch-cve-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/05/</span><span class="invisible">euvd-launch-cve-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>